Patents Examined by Michael Vaughan
-
Patent number: 7158953Abstract: A server architecture for a digital rights management system that distributes and protects rights in content. The server architecture includes a retail site which sells content items to consumers, a fulfillment site which provides to consumers the content items sold by the retail site, and an activation site which enables consumer reading devices to use content items having an enhanced level of copy protection. An activation site provides an activation certificate and a secure repository executable to consumer content-rendering devices which enables those content rendering devices to render content having an enhanced level of copy-resistance. The activation site “activates” client-reading devices in a way that binds them to a persona, and limits the number of devices that may be activated for a particular persona, or the rate at which such devices may be activated for a particular persona.Type: GrantFiled: June 27, 2000Date of Patent: January 2, 2007Assignee: Microsoft CorporationInventors: Marco A. DeMello, Yoram Yaacovi, Pavel Zeman, Kathryn E. Hughes, Frank D. Byrum
-
Patent number: 6865431Abstract: An audio stream is divided into a plurality of audio object (AOB) files that are recorded having each been encrypted using a different encryption key. At least one piece of track management information (TKI) is provided corresponding to each track. Playlist information (PLI) assigns a playback position in a playback order to each track when a plurality of tracks are to be played back one after the other.Type: GrantFiled: May 26, 2000Date of Patent: March 8, 2005Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Teruto Hirota, Kenji Tagawa, Hideki Matsushima, Tomokazu Ishikawa, Shinji Inoue, Masayuki Kozuka
-
Patent number: 6848053Abstract: An optical network unit and an optical line terminal which efficiently control the data receiving and dechurning processes in a passive optical network. In a churning parameter memory subsystem, a first memory bank stores churning parameters that are currently used, while a second memory bank stores updates made to the churning parameters. Under the control of the churning parameter memory subsystem, those first and second memory banks change their roles with each other at a churning key updating time point. A data dechurning unit receives a data stream consisting of a plurality of frames and dechurns the information contained in the data stream, according to the stored churning parameters. When an update is done to the parameters in a certain frame, the data dechurning unit makes the update effective at the next frame, thus starting data dechurning operations from the next frame.Type: GrantFiled: February 29, 2000Date of Patent: January 25, 2005Assignee: Fujitsu LimitedInventors: Takashi Monzawa, Kenji Miura, Tamotsu Matsuo, Hideki Shiono, Yoshimi Toyoda, Toshinori Koyanagi, Setsuo Abiru, Jun Asato, Shinichi Fujiyoshi, Kazuhiro Uchida, Kazuya Ryu, Katsuhiko Hirashima, Tateo Shimaru, Mitsuharu Wakayoshi, Toshiyuki Sakai
-
Patent number: 6829358Abstract: A first station communicates with a second over first and second channels. The first station includes first and second ciphering configurations, and a ciphering engine. The ciphering engine uses the first or second ciphering configuration when ciphering data. Activation times are determined for the channels. A ciphering reconfiguration message is composed containing the activation times. The first station transmits the ciphering reconfiguration message to the second station along the second channel. A reset operation is performed on one of the channels, which does not affect the corresponding activation time. The ciphering engine uses the first ciphering configuration prior to the activation times, and uses the second ciphering configuration on or after the activation times.Type: GrantFiled: August 20, 2001Date of Patent: December 7, 2004Assignee: ASUSTeK Computer Inc.Inventor: Sam Shiaw-Shiang Jiang
-
Patent number: 6807634Abstract: A digital watermarking method encodes different pairs of watermarks into each of a plurality of images offered for use by a vendor. The watermarks in each pair are derived from two separate collections of watermarks and sufficiently different so as to prevent false positives. Because each pair of watermarks is assigned to a different customer relative to a particular image, unauthorized use of a digital image sold to a customer may be determined by locating the associated pair of watermarks assigned to the customer in the image. Collusion detection is also realized by forming each pair of masks from sub-collections of masks which are detectable in an image formed by combining the same images sold to one or more customers.Type: GrantFiled: November 30, 1999Date of Patent: October 19, 2004Assignee: International Business Machines CorporationInventors: Gordon W. Braudaway, Marco Martens, Frederick C. Mintzer, James B. Shearer, Charles P. Tresser, Chai W. Wu
-
Patent number: 6795924Abstract: The present invention relates to a method and an arrangement for performing secure transactions during an information dialogue between a mobile terminal and a WAP server in a mobile network. The dialogue is made by using USSD. According to the invention there is provided a SAT application on the SIM card of the terminal that signs and encrypts data which are to be transferred in a secure way.Type: GrantFiled: June 9, 2000Date of Patent: September 21, 2004Assignee: Telefonaktiebolaget LM EricssonInventors: Johan Kiessling, Than Van Do
-
Patent number: 6731755Abstract: A method of operating a split-key cryptographic system having two or more co-operating microprocessors, i, linked via a communications channel, involving the generation of a public modulus, N, being the multiple of two integers, P,Q, where P=p1+p2 . . . pn and Q=q1+q2 . . . pn in such a way that none of the microprocessors; individually has the ability to decrypt encrypted data. Microprocessor i selects a temporary public modulus and the integers pi, qi, a function of which is transmitted to the other microprocessors, j. Every microprocessor j uses the function to generate a set of numbers which are dependent on integers pj, qj, which are secret to each microprocessor j. Each Microprocessor i then uses these numbers to co-operate to generate the public modulus N. N is thus generated without any party having full knowledge of the integers P and Q.Type: GrantFiled: December 29, 1999Date of Patent: May 4, 2004Assignee: The Director, Government Communications HeadquartersInventor: Clifford C Cocks